• Title/Summary/Keyword: cyber university

Search Result 2,856, Processing Time 0.03 seconds

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.

Automated Cyber Threat Emulation Based on ATT&CK for Cyber Security Training

  • Kim, Donghwa;Kim, Yonghyun;Ahn, Myung-Kil;Lee, Heejo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.71-80
    • /
    • 2020
  • As societies become hyperconnected, we need more cyber security experts. To this end, in this paper, based on the analysis results of the real world cyber attacks and the MITRE ATT&CK framework, we developed CyTEA that can model cyber threats and generate simulated cyber threats in a cyber security training system. In order to confirm whether the simulated cyber threat has the effectiveness of the actual cyber threat level, the simulation level was examined based on procedural, environmental, and consequential similarities. in addition, it was confirmed that the actual defense training using cyber simulation threats is the same as the expected defense training when using real cyber threats in the cyber security training system.

Cyber Weapon Model for the National Cybersecurity (국가사이버안보를 위한 사이버무기 모델 연구)

  • Bae, Si-Hyun;Park, Dae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.223-228
    • /
    • 2019
  • Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

A Study on the Major Factors Influencing the Preference of Cyber University : Focusing on Market Segmentation of College Students by Conjoint Analysis (사이버대학교 선호도에 영향을 미치는 주요 요소에 관한 연구 : 컨조인트 분석에 의한 전문대 재학생 시장 세분화를 중심으로)

  • Lim Yangwhan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.109-123
    • /
    • 2024
  • The purpose of this study is to identify strategic insights for cyber universities to secure a competitive advantage based on market analysis grounded in customer needs and motivations. As a research method, we surveyed and analyzed college students using conjoint analysis, identified the importance of cyber university components, estimated the utility of each detailed level, and identified the configuration of cyber universities most preferred by potential customers. In the study results, the importance of attributes that appeared by analyzing all respondents was in the order of 'expected ourcoms after graduation', 'department characteristic', 'cyber university name', and 'learning management style'. Cluster analysis was performed, divided into two groups, and conjoint analysis was performed. For Cluster 1, the importance values of the components were 'expected outcomes after graduation,' 'learning management style,' 'cyber university name,' and 'department characteristics,' in that order. For Cluster 2, the importance values were 'expected outcomes after graduation,' 'department characteristics,' 'cyber university name,' and 'learning management style,' in that order. As an application of the research, As an application of the study, it is suggested that analyzing the preferences of potential customers in the entire group is not accurate; therefore, segmenting the groups for analysis and strategy formulation can be useful.

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks

  • Singh, Devendra Kumar;Shrivastava, Manish
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.272-276
    • /
    • 2021
  • Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.

국내 17개 사이버대학교 웹사이트 평가 및 개선방안 연구

  • Mun, Tae-Eun;Mun, Hyeong-Nam
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.05a
    • /
    • pp.111-120
    • /
    • 2007
  • Recently the importance of website becomes confident in realizing the long distance education (teleeducation) as web. The purpose of this research is evaluating the websites of cyber university and analyzes web usability and web accessibility and analyzes to suggest the good quality content and several personalized service. Also we tried to improve website quality and contribute the reliability of the long distance education with all these. For these we applied the of professor Hyung Nam Moon's SM-ABCDE website evaluation model and developed the check list suitable for cyber university and evaluated websites in the five views of Attraction, Business, Content, Design, Engineering. Totally Kyunghee Cyber University, Busan Digital University, Hanyang Cyber University is selected best in sequence. But every website doesn't keep the basic observation rule of the web accessibility.

  • PDF

A Study on the Present Conditions and the Characteristics of Design Courses of Cyber Universities in Korea (한국의 사이버 대학 현황과 개설된 디자인 강좌에 대한 연구)

  • 이동훈
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.271-280
    • /
    • 2003
  • This research describes the definition of the characteristics and the role of cyber education through examination of the general situations of sixteen cyber Universities which have been operated in 2003. This research argued about problems and improvements of cyber university in terms of present registration condition of each University. Through the analysis of the data of Korean Ministry of Education & Human Resources Development in 2002. This research also analyzed qualitative aspects of design education that consist in cyber university through comparative analysis of characteristics, department names, a curriculum, a taxonomy of lecture type which are related to design major in each University. As a conclusion, this research emphasized the importance and the meaning of interaction between an instructor and students for successful cyber lecture.

  • PDF

Cyber threat intelligence sharing system (사이버 위협 인텔리전스 공유 체계 연구)

  • Yang, Jun-ho;Kim, Chan-jin;Kim, Mee-yeon;Kim, Ji-hye;Kim, Jong-hyun;Youm, Heung-youl
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.647-650
    • /
    • 2018
  • With the advent of advanced technologies in the real world, the cyber domain has become wider and cyber threats are increasing. A cyber threat intelligence sharing system is needed to more effectively defend and respond to such cyber threats. Through the definition of cyber threat information expression standard, it enables rapid sharing, consistent analysis, and automated interpretation of cyber threat information possessed by individual security control providers or organizations.

  • PDF

Design of the Cyber Education at the University-Level (대학교육에 있어서의 사이버 교육 구현 방안)

  • 김정희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.943-952
    • /
    • 2002
  • This paper discussed actualizing cyber education at the university education. First of all, I discussed the necessity of education based on the multimedia and web according to the change of loaming environment caused by development of technology. I discussed the Cyber education that are important application at university education. Next, I proposed the important elements that are required in constructing the Cyber education. Also, we discussed the structure and platform of Cyber education. Also, I reviewed the foreign and domestic Cyber education based on the multimedia and Web. Finally, I proposed the direction of future Cyber education.

  • PDF

Cyber Learning Program of a University Library's Information Literacy Education: Its Development and Course Management (도서관 정보이용교육: Cyber 강좌 개발과 실제 운영)

  • Lee, Choon-Shil
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.16 no.1
    • /
    • pp.5-26
    • /
    • 2005
  • Sookmyung Women's University Library developed a Cyber Learning Program for Information Literacy Education in the Fall semester of 2004. The program was enforced as a pass/fail prerequisite of the "Reading & Writing", a compulsory course for the first-year students. The paper describes why and how the university reached to the decision to initiate such a program. It identifies the factors which contributed to the early success of the program by analyzing the contents development process and the actual course management process. Suggestions for further developments is made by analyzing the technical and procedural difficulties faced using the Learning Management System(LMS).

  • PDF